Page 3 of 30 results (0.007 seconds)

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 0

30 Oct 2001 — Internet Explorer 6 and earlier allows remote attackers to cause certain HTTP requests to be automatically executed and appear to come from the user, which could allow attackers to gain privileges or execute operations within web-based services, aka the "HTTP Request Encoding vulnerability." • http://www.osvdb.org/1972 •

CVSS: 8.8EPSS: 14%CPEs: 2EXPL: 1

11 Dec 2000 — Microsoft Virtual Machine (VM) in Internet Explorer 4.x and 5.x allows an unsigned applet to create and use ActiveX controls, which allows a remote attacker to bypass Internet Explorer's security settings and execute arbitrary commands via a malicious web page or email, aka the "Microsoft VM ActiveX Component" vulnerability. • https://www.exploit-db.com/exploits/20266 •

CVSS: 2.6EPSS: 16%CPEs: 9EXPL: 0

13 Oct 2000 — A function in Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a variant of the "Frame Domain Verification" vulnerability. • http://www.securityfocus.com/bid/1564 •

CVSS: 5.9EPSS: 2%CPEs: 14EXPL: 0

05 Jun 2000 — Internet Explorer 4.x and 5.x does not properly verify all contents of an SSL certificate if a connection is made to the server via an image or a frame, aka one of two different "SSL Certificate Validation" vulnerabilities. • http://www.acrossecurity.com/aspr/ASPR-1999-12-15-1-PUB.txt •

CVSS: 7.4EPSS: 2%CPEs: 14EXPL: 0

05 Jun 2000 — Internet Explorer 4.x and 5.x does not properly re-validate an SSL certificate if the user establishes a new SSL session with the same server during the same Internet Explorer session, aka one of two different "SSL Certificate Validation" vulnerabilities. • http://www.acrossecurity.com/aspr/ASPR-1999-12-15-1-PUB.txt •

CVSS: 7.6EPSS: 10%CPEs: 3EXPL: 0

21 Feb 2000 — The Microsoft Active Setup ActiveX component in Internet Explorer 4.x and 5.x allows a remote attacker to install software components without prompting the user by stating that the software's manufacturer is Microsoft. • http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=20000221103938.T21312%40securityfocus.com •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

18 Feb 2000 — The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011 •

CVSS: 9.8EPSS: 7%CPEs: 3EXPL: 1

06 Dec 1999 — Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol. • https://www.exploit-db.com/exploits/19665 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

29 Nov 1999 — Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246972 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 8%CPEs: 20EXPL: 1

11 Nov 1999 — A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability. • https://www.exploit-db.com/exploits/19603 •